Passwords - System Issues: Difference between revisions

From
Jump to navigation Jump to search
No edit summary
No edit summary
 
Line 1: Line 1:
Basically there are '''four''' possibilities, how systems can be attacked in general:
Basically there are '''four''' possibilities, how systems can be attacked in general:
<br><br>
<br><br>
1. Attacking one account (The intruder tries to guess a specific password)<br>
1. Attacking '' '''one''' '' account (The intruder tries to guess a specific password)<br>
2. Attempt to penetrate any account (on a system) used to steal a service directly<br>
2. Attempt to penetrate '' '''any''' '' account (on a system) used to steal a service directly<br>
3. Attempt to penetrate any account on any system to gain access (for example to hide pirated software or pornography)<br>
3. Attempt to penetrate '' '''any''' '' account on '' '''any''' '' system to gain access (for example to hide pirated software or pornography)<br>
4. Service Denial Attack (The intruder tries to prevent the legitimate user from using the system)<br>
4. ''Service Denial Attack'' (The intruder tries to prevent the legitimate user from using the system)<br>
<br><br>
<br><br>



Latest revision as of 20:54, 8 November 2004

Basically there are four possibilities, how systems can be attacked in general:

1. Attacking one account (The intruder tries to guess a specific password)
2. Attempt to penetrate any account (on a system) used to steal a service directly
3. Attempt to penetrate any account on any system to gain access (for example to hide pirated software or pornography)
4. Service Denial Attack (The intruder tries to prevent the legitimate user from using the system)




Back (A Bad Mnemonic System) | Table of Contents | Next (Protecting Oneself Or Others?)